| /src/lib/libtelnet/ |
| pk.h | 42 genkeys(char *public, char *secret) 43 common_key(char *secret, char *public, desData *deskey) 46 char secret[HEXKEYBYTES + 1]; 55 extern void genkeys(char *public, char *secret); 56 extern void common_key(char *secret, char *public, IdeaData *common,
|
| pk.c | 41 genkeys(char *public, char *secret) 42 common_key(char *secret, char *public, desData *deskey) 47 char secret[HEXKEYBYTES + 1]; 130 * get common key from my secret key and his public key 136 BIGNUM *secret = BN_new(); local in function:common_key 143 (void)BN_hex2bn(&secret, xsecret); 146 BN_mod_exp(common, public, secret, modulus, ctx); 153 BN_free(secret); 171 * Generate a random public/secret key pair 174 genkeys(char *public, char *secret) [all...] |
| /src/common/lib/libc/hash/sha3/ |
| keccak.c | 43 #define secret /* can't use in variable-time operations, should zero */ macro 54 static inline secret uint64_t 55 rol64(secret uint64_t v, unsigned c) 62 keccakf1600_theta(secret uint64_t A[25]) 64 secret uint64_t C0, C1, C2, C3, C4; 85 keccakf1600_rho_pi(secret uint64_t A[25]) 87 secret uint64_t T, U; 121 keccakf1600_chi(secret uint64_t A[25]) 123 secret uint64_t B0, B1, B2, B3, B4; 141 keccakf1600_round(secret uint64_t A[25] [all...] |
| /src/lib/libradius/ |
| radlib_private.h | 68 char *secret; /* Shared secret */ member in struct:rad_server
|
| radlib.c | 134 MD5Update(&ctx, (MD5Buf)srvp->secret, 135 (MD5Len)strlen(srvp->secret)); 167 MD5Update(&ctx, (MD5Buf)srvp->secret, 168 (MD5Len)strlen(srvp->secret)); 185 HMAC_Init_ex(ctx, srvp->secret, 186 (int)strlen(srvp->secret), EVP_md5(), NULL); 241 MD5Update(&ctx, (MD5Buf)srvp->secret, 242 (MD5Len)strlen(srvp->secret)); 266 HMAC_Init_ex(hctx, srvp->secret, 267 (int)strlen(srvp->secret), EVP_md5(), NULL) 427 const char *secret; local in function:rad_config [all...] |
| /src/games/hack/ |
| hack.mklev.c | 81 static boolean secret; /* TRUE while making a vault: increase variable in typeref:typename:boolean 138 secret = FALSE; 195 /* make a secret treasure vault, not connected to the rest */ 199 secret = TRUE; 236 xlim = XLIM + secret; 237 ylim = YLIM + secret; 249 if (!secret && nroom > (MAXNROFROOMS / 3) && 261 if (secret) 274 if (secret || !rn2(MAXNROFROOMS + 1 - nroom - tryct)) { 290 if (secret) [all...] |
| /src/lib/libskey/ |
| skeylogin.c | 496 secret = hseed; 501 secret = ctime(&t); 502 secretlen = strlen(secret); 511 /* Hash secret value with username */ 513 SHA1Update(&ctx, secret, secretlen); 518 memset(secret, 0, secretlen);
|
| /src/sys/crypto/nist_hash_drbg/ |
| nist_hash_drbg.c | 75 #define secret /* must not use in variable-time operations; should zero */ 96 static void hashgen(secret uint8_t *, size_t, 97 const secret uint8_t[SEEDLEN_BYTES]); 98 static void add8(secret uint8_t *, size_t, const secret uint8_t *, size_t); 99 static void hash_df(secret void *, size_t, const struct hvec *, size_t); 100 static void hash_df_block(secret void *, uint8_t, uint8_t[4], 120 nist_hash_drbg_instantiate(secret struct nist_hash_drbg *D, 121 const secret void *entropy, size_t entropylen, 160 nist_hash_drbg_reseed(secret struct nist_hash_drbg *D 74 #define secret macro [all...] |
| /src/sys/external/bsd/drm2/dist/drm/nouveau/nvkm/engine/ |
| nouveau_nvkm_engine_falcon.c | 146 falcon->secret = (falcon->addr == 0x087000) ? 1 : 0; 150 falcon->secret = (caps & 0x00000030) >> 4; 158 nvkm_debug(subdev, "secret level: %d\n", falcon->secret); 176 if (falcon->secret && falcon->version < 4) {
|
| /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/argon2/ |
| argon2-core.c | 293 /* Validate secret (optional param) */ 294 if (NULL == context->secret) { 449 if (context->secret != NULL) { 451 &BlakeHash, (const uint8_t *) context->secret, context->secretlen); 454 sodium_memzero(context->secret, context->secretlen);
|
| argon2.h | 142 * secret and its length, 149 * Also, three flags indicate whether to erase password, secret as soon as they 173 uint8_t *secret; /* key array */ member in struct:Argon2_Context
|
| argon2.c | 119 context.secret = NULL; 214 ctx.secret = NULL;
|
| pwhash_argon2i.c | 262 ctx.ad = ctx.secret = NULL;
|
| /src/sys/external/bsd/drm2/dist/drm/nouveau/nvkm/falcon/ |
| nouveau_nvkm_falcon_base.c | 38 if (secure && !falcon->secret) { 160 falcon->secret = (reg >> 4) & 0x3;
|
| /src/sys/net/ |
| if_spppsubr.c | 1144 if (sp->myauth.secret) free(sp->myauth.secret, M_DEVBUF); 1146 if (sp->hisauth.secret) free(sp->hisauth.secret, M_DEVBUF); 4621 if (sp->myauth.secret == NULL || sp->myauth.name == NULL) { 4625 "without my name and my secret being set\n"); 4663 MD5Update(&ctx, sp->myauth.secret, sp->myauth.secret_len); 4752 if (sp->hisauth.name == NULL || sp->hisauth.secret == NULL) { 4755 "without his name and his secret being set\n"); 4820 MD5Update(&ctx, sp->hisauth.secret, sp->hisauth.secret_len) 5028 char *name, *secret; local in function:sppp_pap_input [all...] |
| if_spppvar.h | 90 char *secret; /* secret password */ member in struct:sauth
|
| /src/sys/external/bsd/drm2/dist/drm/nouveau/include/nvkm/engine/ |
| falcon.h | 33 u8 secret; member in struct:nvkm_falcon
|
| /src/sys/lib/libkern/ |
| entpool.c | 91 #define secret /* must not use in variable-time operations; should zero */ 240 entpool_extract(struct entpool *P, secret void *buf, size_t len) 90 #define secret macro
|
| /src/sys/dev/iscsi/ |
| iscsi_text.c | 197 uint8_t password[MAX_STRING + 1]; /* authentication secret */ 198 uint8_t target_password[MAX_STRING + 1]; /* target authentication secret */ 224 chap_md5_response(uint8_t *buffer, uint8_t identifier, uint8_t *secret, 231 MD5Update(&md5, secret, strlen(secret));
|
| /src/sys/netinet/ |
| sctputil.c | 969 int i, secret; local in function:sctp_timeout_handler 980 secret = (int)inp->sctp_ep.current_secret_number; 982 inp->sctp_ep.secret_key[secret][i] =
|